1,264 research outputs found

    Virtual reality application for rehabilitation

    Get PDF
    Aquest projecte té com a objectiu desenvolupar una aplicació de Realitat Virtual funcional per a la rehabilitació i el benestar de la gent gran en residències d’avis. El que es pretén és complementar el tractament de rehabilitació dels pacients mitjançant jocs de Realitat Virtual que els permetin realitzar moviments repetitius mentre es mouen per un entorn natural immersiu.Este proyecto tiene como objetivo desarrollar una aplicación de Realidad Virtual funcional para la rehabilitación y el bienestar de las personas mayores en residencias de ancianos. Lo que se pretende es complementar el tratamiento de rehabilitación de los pacientes mediante juegos de Realidad Virtual que les permitan realizar movimientos repetitivos mientras se mueven por un entorno natural inmersivo.This project aims to develop a functional Virtual Reality application for the rehabilitation and well-being of older adults in nursing homes. It intends to engage the patient in the rehabilitation treatment by means of Virtual Reality games. To play these games, the patient must execute repetitive movements while moving around in an immersive natural environment.Objectius de Desenvolupament Sostenible::3 - Salut i Benesta

    Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications

    Full text link
    Social Virtual Reality based Learning Environments (VRLEs) such as vSocial render instructional content in a three-dimensional immersive computer experience for training youth with learning impediments. There are limited prior works that explored attack vulnerability in VR technology, and hence there is a need for systematic frameworks to quantify risks corresponding to security, privacy, and safety (SPS) threats. The SPS threats can adversely impact the educational user experience and hinder delivery of VRLE content. In this paper, we propose a novel risk assessment framework that utilizes attack trees to calculate a risk score for varied VRLE threats with rate and duration of threats as inputs. We compare the impact of a well-constructed attack tree with an adhoc attack tree to study the trade-offs between overheads in managing attack trees, and the cost of risk mitigation when vulnerabilities are identified. We use a vSocial VRLE testbed in a case study to showcase the effectiveness of our framework and demonstrate how a suitable attack tree formalism can result in a more safer, privacy-preserving and secure VRLE system.Comment: Tp appear in the CCNC 2019 Conferenc
    corecore